This user is listed as a non-competitor.
Module 0: Windows Binaries, 0 / 50 (0%)
0% complete
Module 1: Dynamic Analysis, 0 / 110 (0%)
0% complete
Module 2: Tools Arsenal, 92 / 309 (30%)
29.773462783172% complete
Module 3: Packers & Obfuscators, 0 / 519 (0%)
0% complete
Module 4: Reverse Engineering, 0 / 708 (0%)
0% complete
Module 5: Aniti-Malware Tricks, 0 / 507 (0%)
0% complete
Module 6: Process Injection, 400 / 500 (80%)
80% complete
Module 7: .NET Reversing, 0 / 900 (0%)
0% complete
Module 8: Dissecting Infostealers like a BOSS, 0 / 903 (0%)
0% complete
Module 9: Fighting Ransomware, 0 / 880 (0%)
0% complete
Total: 492 / 5,386 (9.1%)
Challenge Solved Points
Class 5.1 (Lab): Fakenet 101 (Module 2: Tools Arsenal) #5, 3 months, 27 days after release (2025-08-30 16:22:51) 46
Class 5 (Lab): Wireshark 101 (Module 2: Tools Arsenal) #6, 3 months, 28 days after release (2025-08-30 16:17:43) 46
Class 4 (Chall): Find the Shellcode (Module 6: Process Injection) First to solve this challenge! 1 month, 25 days after release (2025-08-21 19:48:10) 95
Class 3 (Chall): Find the Window (Module 6: Process Injection) First to solve this challenge! 1 month, 25 days after release (2025-08-21 19:46:47) 80
Class 2.1 (Lab): SetThreadContext Technique (Module 6: Process Injection) Third to solve this challenge! 1 year, 3 months after release (2025-08-21 19:46:31) 75
Class 2 (Lab): SetThreadContext Technique (Module 6: Process Injection) Third to solve this challenge! 1 year, 3 months after release (2025-08-21 19:46:17) 75
Class 1 (Lab): CreateRemoteThread Technique (Module 6: Process Injection) #4, 1 year, 3 months after release (2025-08-21 19:46:03) 75